Search the dblp DataBase
Gregory Neven :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mihir Bellare , Gregory Neven Transitive Signatures Based on Factoring and RSA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:397-414 [Conf ] Mihir Bellare , Gregory Neven Multi-signatures in the plain public-Key model and a general forking lemma. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:390-399 [Conf ] Michel Abdalla , Mihir Bellare , Dario Catalano , Eike Kiltz , Tadayoshi Kohno , Tanja Lange , John Malone-Lee , Gregory Neven , Pascal Paillier , Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:205-222 [Conf ] Michel Abdalla , Chanathip Namprempre , Gregory Neven On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:262-279 [Conf ] Mihir Bellare , Gregory Neven Identity-Based Multi-signatures from RSA. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:145-162 [Conf ] Bart De Decker , Gregory Neven , Frank Piessens , Erik Van Hoeymissen Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP ] DAIS, 2001, pp:217-228 [Conf ] Mihir Bellare , Chanathip Namprempre , Gregory Neven Security Proofs for Identity-Based Identification and Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:268-286 [Conf ] Klaus Kursawe , Gregory Neven , Pim Tuyls Private Policy Negotiation. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:81-95 [Conf ] Michel Abdalla , Dario Catalano , Alexander W. Dent , John Malone-Lee , Gregory Neven , Nigel P. Smart Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:300-311 [Conf ] Bart De Decker , Frank Piessens , Erik Van Hoeymissen , Gregory Neven Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP ] MATA, 2000, pp:219-232 [Conf ] Bart De Decker , Gregory Neven , Frank Piessens Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:337-348 [Conf ] T. Herlea , Joris Claessens , Bart Preneel , Gregory Neven , Frank Piessens , Bart De Decker On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:183-198 [Conf ] Gregory Neven , Frank Piessens , Bart De Decker On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:361-370 [Conf ] Mihir Bellare , Gregory Neven Transitive signatures: new schemes and proofs. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:6, pp:2133-2151 [Journal ] James Birkett , Alexander W. Dent , Gregory Neven , Jacob C. N. Schuldt Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:274-292 [Conf ] Elena Andreeva , Gregory Neven , Bart Preneel , Thomas Shrimpton Seven-Property-Preserving Iterated Hashing: ROX. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:130-146 [Conf ] Michel Abdalla , Eike Kiltz , Gregory Neven Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:139-154 [Conf ] Jan Camenisch , Gregory Neven , Abhi Shelat Simulatable Adaptive Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:573-590 [Conf ] Mihir Bellare , Chanathip Namprempre , Gregory Neven Unrestricted Aggregate Signatures. [Citation Graph (0, 0)][DBLP ] ICALP, 2007, pp:411-422 [Conf ] Michel Abdalla , Alexander W. Dent , John Malone-Lee , Gregory Neven , Duong Hieu Phan , Nigel P. Smart Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:361-376 [Conf ] Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. [Citation Graph (, )][DBLP ] Oblivious transfer with access control. [Citation Graph (, )][DBLP ] Efficient Sequential Aggregate Signed Data. [Citation Graph (, )][DBLP ] Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. [Citation Graph (, )][DBLP ] A card requirements language enabling privacy-preserving access control. [Citation Graph (, )][DBLP ] Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP ] Robust Encryption. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs